Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for reducing operation amount in SM3 password hashing algorithm

A technology of hash algorithm and calculation amount, which is applied in the direction of encryption device with shift register/memory, secure communication device, digital transmission system, etc., and can solve the problems of large total delay and affecting the operation speed of cryptographic algorithm, etc.

Inactive Publication Date: 2017-06-13
GUANGDONG UNIV OF TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Every time an iterative operation is performed on V, it is necessary to perform 64 iterative operations on the 8 variable words ABCDEFGH, so the total delay generated is very large, and it also seriously affects the operation speed of the cryptographic algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for reducing operation amount in SM3 password hashing algorithm
  • Method and device for reducing operation amount in SM3 password hashing algorithm
  • Method and device for reducing operation amount in SM3 password hashing algorithm

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0114] see figure 2 , the embodiment of the present invention provides a first embodiment of a method for reducing the amount of computation in the SM3 cryptographic hash algorithm, including:

[0115] S1, group B according to the preset message (i) , the first formula and the second formula determine the message extension word W of 32 bit length 0 -W 67 , W′ 0 -W' 63 , the first formula is The second formula is where i is the first iteration number, is the replacement function;

[0116] In the embodiment of the present invention, it is first necessary to group B according to the preset message (i) , the first formula and the second formula determine the message extension word W of 32 bit length 0 -W 67 , W′ 0 -W' 63 , the first formula is The second formula is where i is the first iteration number, is the replacement function, W 0 -W 67 , W′ 0 -W' 63 refers to W 0 to W 67 , W′ 0 -W' 63 means W' 0 to W' 63 .

[0117] S2, respectively initialize...

no. 2 example

[0150] see image 3 and Figure 4 , the embodiment of the present invention provides a second embodiment of a method for reducing the amount of computation in the SM3 cryptographic hash algorithm, including:

[0151] 101. Initialize the initial value of the first iteration number i to 0 and initialize the 0th iteration value V(0) of the compression function V corresponding to the first iteration number i;

[0152] In the embodiment of the present invention, it is first necessary to initialize the initial value of the first iteration number i to 0 and initialize the 0th iteration value V(0) of the compression function V corresponding to the first iteration number i, V (0) It is expressed in hexadecimal 7380166f4914b2b9 172442d7da8a0600a96f30bc 163138aa e38dee4d b0fb0e4e.

[0153] 102. Group B according to the preset message (i) , the first formula and the second formula determine the message extension word W of 32 bit length 0 -W 67 , W′ 0 -W' 63 and parameter N, the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for reducing an operation amount in an SM3 password hashing algorithm. A parallel addition operation is utilized to replace a great number of serial addition operations, and the number of the serial addition operations is reduced, so that operation delay is reduced, and an operation speed of the SM3 password hashing algorithm is improved.

Description

technical field [0001] The invention relates to the application field of smart home security chips of the Internet of Things, in particular to a method and a device for reducing the calculation amount in the SM3 cryptographic hash algorithm. Background technique [0002] Smart home is in the early stage of explosive growth. IoT products are one of the most mainstream products in today's society, and they are already closely related to the life of human beings in the world. IoT product security is also one of the most important factors we need to consider now. The core technology for protecting the security of the Internet of Things - encryption technology has also become more and more important. Cryptography technology has been widely used since ancient times. With the rapid development of computer and network communication technology, more and more information needs to be kept strictly confidential, and cryptography has gradually entered the daily life of the public. Hash...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618H04L2209/125
Inventor 徐明熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products